Bugtraq mailing list archives

rPSA-2007-0242-1 php5 php5-cgi php5-mysql php5-pear php5-pgsql php5-soap php5-xsl


From: rPath Update Announcements <announce-noreply () rpath com>
Date: Mon, 19 Nov 2007 15:06:46 -0500

rPath Security Advisory: 2007-0242-1
Published: 2007-11-19
Products:
    rPath Appliance Platform Linux Service 1
    rPath Linux 1

Rating: Minor
Exposure Level Classification:
    Remote Deterministic Denial of Service
Updated Versions:
    php5=conary.rpath.com@rpl:1/5.2.5-1-1
    php5-cgi=conary.rpath.com@rpl:1/5.2.5-1-1
    php5-mysql=conary.rpath.com@rpl:1/5.2.5-1-1
    php5-pear=conary.rpath.com@rpl:1/5.2.5-1-1
    php5-pgsql=conary.rpath.com@rpl:1/5.2.5-1-1
    php5-soap=conary.rpath.com@rpl:1/5.2.5-1-1
    php5-xsl=conary.rpath.com@rpl:1/5.2.5-1-1

rPath Issue Tracking System:
    https://issues.rpath.com/browse/RPL-1943

References:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4887
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4783
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5898
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5899
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5900

Description:
    Previous versions of the php5 package contain multiple vulnerabilities,
    the most serious of which involve several Denial of Service attacks
    (application crashes and temporary application hangs).  It is not
    currently known that these vulnerabilities can be exploited to execute
    malicious code.
    
    In its default configuration, rPath Linux 1 does not install php5 and
    is thus not vulnerable; however, systems upon which php5 and an exposed
    application have been installed may be vulnerable.

http://wiki.rpath.com/Advisories:rPSA-2007-0242

Copyright 2007 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html


Current thread: